diff options
author | galaxico <galatoulas@cti.gr> | 2021-08-25 03:05:32 +0300 |
---|---|---|
committer | galaxico <galatoulas@cti.gr> | 2021-08-25 03:05:32 +0300 |
commit | 1e203ddb0fc33b08be4b4d5a29354ae26ff686be (patch) | |
tree | 8415ce2d4d08bb9e81d950771fd92d2d3f8863a1 /greek/News | |
parent | aeab779fb98ea69ea8605bf9a2e5a578f60faef2 (diff) |
Debian 11 News release greek translation
Diffstat (limited to 'greek/News')
-rw-r--r-- | greek/News/2021/20210206.wml | 236 | ||||
-rw-r--r-- | greek/News/2021/20210327.wml | 203 | ||||
-rw-r--r-- | greek/News/2021/20210619.wml | 273 | ||||
-rw-r--r-- | greek/News/2021/20210812.wml | 47 | ||||
-rw-r--r-- | greek/News/2021/20210814.wml | 273 | ||||
-rw-r--r-- | greek/News/2021/20210815.wml | 195 | ||||
-rw-r--r-- | greek/News/2021/Makefile | 1 | ||||
-rw-r--r-- | greek/News/2021/index.wml | 14 |
8 files changed, 1242 insertions, 0 deletions
diff --git a/greek/News/2021/20210206.wml b/greek/News/2021/20210206.wml new file mode 100644 index 00000000000..54eab1c417d --- /dev/null +++ b/greek/News/2021/20210206.wml @@ -0,0 +1,236 @@ +#use wml::debian::translation-check translation="156615cc19b61bffcfb93a5ff5e5e300fcbc9492" maintainer="galaxico" +<define-tag pagetitle>Updated Debian 10: 10.8 released</define-tag> +<define-tag release_date>2021-02-06</define-tag> +#use wml::debian::news + +<define-tag release>10</define-tag> +<define-tag codename>buster</define-tag> +<define-tag revision>10.8</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p>The Debian project is pleased to announce the eighth update of its +stable distribution Debian <release> (codename <q><codename></q>). +This point release mainly adds corrections for security issues, +along with a few adjustments for serious problems. Security advisories +have already been published separately and are referenced where available.</p> + +<p>Please note that the point release does not constitute a new version of Debian +<release> but only updates some of the packages included. There is +no need to throw away old <q><codename></q> media. After installation, +packages can be upgraded to the current versions using an up-to-date Debian +mirror.</p> + +<p>Those who frequently install updates from security.debian.org won't have +to update many packages, and most such updates are +included in the point release.</p> + +<p>New installation images will be available soon at the regular locations.</p> + +<p>Upgrading an existing installation to this revision can be achieved by +pointing the package management system at one of Debian's many HTTP mirrors. +A comprehensive list of mirrors is available at:</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + + + +<h2>Miscellaneous Bugfixes</h2> + +<p>This stable update adds a few important corrections to the following packages:</p> + +<table border=0> +<tr><th>Package</th> <th>Reason</th></tr> +<correction atftp "Fix denial of service issue [CVE-2020-6097]"> +<correction base-files "Update /etc/debian_version for the 10.8 point release"> +<correction ca-certificates "Update Mozilla CA bundle to 2.40, blacklist expired <q>AddTrust External Root</q>"> +<correction cacti "Fix SQL injection issue [CVE-2020-35701] and stored XSS issue"> +<correction cairo "Fix mask usage in image-compositor [CVE-2020-35492]"> +<correction choose-mirror "Update mirror list"> +<correction cjson "Fix infinite loop in cJSON_Minify"> +<correction clevis "Fix initramfs creation; clevis-dracut: Trigger initramfs creation upon installation"> +<correction cyrus-imapd "Fix version comparison in cron script"> +<correction debian-edu-config "Move host keytabs cleanup code out of gosa-modify-host into a standalone script, reducing LDAP calls to a single query"> +<correction debian-installer "Use 4.19.0-14 Linux kernel ABI; rebuild against proposed-updates"> +<correction debian-installer-netboot-images "Rebuild against proposed-updates"> +<correction debian-installer-utils "Support partitions on USB UAS devices"> +<correction device-tree-compiler "Fix segfault on <q>dtc -I fs /proc/device-tree</q>"> +<correction didjvu "Add missing build-dependency on tzdata"> +<correction dovecot "Fix crash when searching mailboxes containing malformed MIME messages"> +<correction dpdk "New upstream stable release"> +<correction edk2 "CryptoPkg/BaseCryptLib: fix NULL dereference [CVE-2019-14584]"> +<correction emacs "Don't crash with OpenPGP User IDs with no e-mail address"> +<correction fcitx "Fix input method support in Flatpaks"> +<correction file "Increase name recursion depth to 50 by default"> +<correction geoclue-2.0 "Check the maximum allowed accuracy level even for system applications; make the Mozilla API key configurable and use a Debian-specific key by default; fix display of the usage indicator"> +<correction gnutls28 "Fix test suite error caused by expired certificate"> +<correction grub2 "When upgrading grub-pc noninteractively, bail out if grub-install fails; explicitly check whether the target device exists before running grub-install; grub-install: Add backup and restore; don't call grub-install on fresh install of grub-pc"> +<correction highlight.js "Fix prototype pollution [CVE-2020-26237]"> +<correction intel-microcode "Update various microcode"> +<correction iproute2 "Fix bugs in JSON output; fix race condition that DOSes the system when using ip netns add at boot"> +<correction irssi-plugin-xmpp "Do not trigger the irssi core connect timeout prematurely, thus fixing STARTTLS connections"> +<correction libdatetime-timezone-perl "Update for new tzdata version"> +<correction libdbd-csv-perl "Fix test failure with libdbi-perl 1.642-1+deb10u2"> +<correction libdbi-perl "Security fix [CVE-2014-10402]"> +<correction libmaxminddb "Fix heap-based buffer over-read [CVE-2020-28241]"> +<correction lttng-modules "Fix build on kernel versions >= 4.19.0-10"> +<correction m2crypto "Fix compatibility with OpenSSL 1.1.1i and newer"> +<correction mini-buildd "builder.py: sbuild call: set '--no-arch-all' explicitly"> +<correction net-snmp "snmpd: Add cacheTime and execType flags to EXTEND-MIB"> +<correction node-ini "Do not allow invalid hazardous string as section name [CVE-2020-7788]"> +<correction node-y18n "Fix prototype pollution issue [CVE-2020-7774]"> +<correction nvidia-graphics-drivers "New upstream release; fix possible denial of service and information disclosure [CVE-2021-1056]"> +<correction nvidia-graphics-drivers-legacy-390xx "New upstream release; fix possible denial of service and information disclosure [CVE-2021-1056]"> +<correction pdns "Security fixes [CVE-2019-10203 CVE-2020-17482]"> +<correction pepperflashplugin-nonfree "Turn into a dummy package taking care of removing the previously installed plugin (no longer functional nor supported)"> +<correction pngcheck "Fix buffer overflow [CVE-2020-27818]"> +<correction postgresql-11 "New upstream stable release; security fixes [CVE-2020-25694 CVE-2020-25695 CVE-2020-25696]"> +<correction postsrsd "Ensure timestamp tags aren't too long before trying to decode them [CVE-2020-35573]"> +<correction python-bottle "Stop allowing <q>;</q> as a query-string separator [CVE-2020-28473]"> +<correction python-certbot "Automatically use ACMEv2 API for renewals, to avoid issues with ACMEv1 API removal"> +<correction qxmpp "Fix potential SEGFAULT on connection error"> +<correction silx "python(3)-silx: Add dependency on python(3)-scipy"> +<correction slirp "Fix buffer overflows [CVE-2020-7039 CVE-2020-8608]"> +<correction steam "New upstream release"> +<correction systemd "journal: do not trigger assertion when journal_file_close() is passed NULL"> +<correction tang "Avoid race condition between keygen and update"> +<correction tzdata "New upstream release; update included timezone data"> +<correction unzip "Apply further fixes for CVE-2019-13232"> +<correction wireshark "Fix various crashes, infinite loops and memory leaks [CVE-2019-16319 CVE-2019-19553 CVE-2020-11647 CVE-2020-13164 CVE-2020-15466 CVE-2020-25862 CVE-2020-25863 CVE-2020-26418 CVE-2020-26421 CVE-2020-26575 CVE-2020-28030 CVE-2020-7045 CVE-2020-9428 CVE-2020-9430 CVE-2020-9431]"> +</table> + + +<h2>Security Updates</h2> + + +<p>This revision adds the following security updates to the stable release. +The Security Team has already released an advisory for each of these +updates:</p> + +<table border=0> +<tr><th>Advisory ID</th> <th>Package</th></tr> +<dsa 2020 4797 webkit2gtk> +<dsa 2020 4801 brotli> +<dsa 2020 4802 thunderbird> +<dsa 2020 4803 xorg-server> +<dsa 2020 4804 xen> +<dsa 2020 4805 trafficserver> +<dsa 2020 4806 minidlna> +<dsa 2020 4807 openssl> +<dsa 2020 4808 apt> +<dsa 2020 4809 python-apt> +<dsa 2020 4810 lxml> +<dsa 2020 4811 libxstream-java> +<dsa 2020 4812 xen> +<dsa 2020 4813 firefox-esr> +<dsa 2020 4814 xerces-c> +<dsa 2020 4815 thunderbird> +<dsa 2020 4816 mediawiki> +<dsa 2020 4817 php-pear> +<dsa 2020 4818 sympa> +<dsa 2020 4819 kitty> +<dsa 2020 4820 horizon> +<dsa 2020 4821 roundcube> +<dsa 2021 4822 p11-kit> +<dsa 2021 4823 influxdb> +<dsa 2021 4824 chromium> +<dsa 2021 4825 dovecot> +<dsa 2021 4827 firefox-esr> +<dsa 2021 4828 libxstream-java> +<dsa 2021 4829 coturn> +<dsa 2021 4830 flatpak> +<dsa 2021 4831 ruby-redcarpet> +<dsa 2021 4832 chromium> +<dsa 2021 4833 gst-plugins-bad1.0> +<dsa 2021 4834 vlc> +<dsa 2021 4835 tomcat9> +<dsa 2021 4837 salt> +<dsa 2021 4838 mutt> +<dsa 2021 4839 sudo> +<dsa 2021 4840 firefox-esr> +<dsa 2021 4841 slurm-llnl> +<dsa 2021 4843 linux-latest> +<dsa 2021 4843 linux-signed-amd64> +<dsa 2021 4843 linux-signed-arm64> +<dsa 2021 4843 linux-signed-i386> +<dsa 2021 4843 linux> +</table> + + +<h2>Removed packages</h2> + +<p>The following packages were removed due to circumstances beyond our control:</p> + +<table border=0> +<tr><th>Package</th> <th>Reason</th></tr> +<correction compactheader "Incompatible with current Thunderbird versions"> + +</table> + +<h2>Debian Installer</h2> +<p>The installer has been updated to include the fixes incorporated +into stable by the point release.</p> + +<h2>URLs</h2> + +<p>The complete lists of packages that have changed with this revision:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>The current stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/stable/"> +</div> + +<p>Proposed updates to the stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/proposed-updates"> +</div> + +<p>stable distribution information (release notes, errata etc.):</p> + +<div class="center"> + <a + href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> +</div> + +<p>Security announcements and information:</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>About Debian</h2> + +<p>The Debian Project is an association of Free Software developers who +volunteer their time and effort in order to produce the completely +free operating system Debian.</p> + +<h2>Contact Information</h2> + +<p>For further information, please visit the Debian web pages at +<a href="$(HOME)/">https://www.debian.org/</a>, send mail to +<press@debian.org>, or contact the stable release team at +<debian-release@lists.debian.org>.</p> diff --git a/greek/News/2021/20210327.wml b/greek/News/2021/20210327.wml new file mode 100644 index 00000000000..c843e451868 --- /dev/null +++ b/greek/News/2021/20210327.wml @@ -0,0 +1,203 @@ +#use wml::debian::translation-check translation="2a3fa2ac1b49f491737f3c89828986a43c00a61e" maintainer="galaxico" +<define-tag pagetitle>Updated Debian 10: 10.9 released</define-tag> +<define-tag release_date>2021-03-27</define-tag> +#use wml::debian::news + +<define-tag release>10</define-tag> +<define-tag codename>buster</define-tag> +<define-tag revision>10.9</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p>The Debian project is pleased to announce the ninth update of its +stable distribution Debian <release> (codename <q><codename></q>). +This point release mainly adds corrections for security issues, +along with a few adjustments for serious problems. Security advisories +have already been published separately and are referenced where available.</p> + +<p>Please note that the point release does not constitute a new version of Debian +<release> but only updates some of the packages included. There is +no need to throw away old <q><codename></q> media. After installation, +packages can be upgraded to the current versions using an up-to-date Debian +mirror.</p> + +<p>Those who frequently install updates from security.debian.org won't have +to update many packages, and most such updates are +included in the point release.</p> + +<p>New installation images will be available soon at the regular locations.</p> + +<p>Upgrading an existing installation to this revision can be achieved by +pointing the package management system at one of Debian's many HTTP mirrors. +A comprehensive list of mirrors is available at:</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + + + +<h2>Miscellaneous Bugfixes</h2> + +<p>This stable update adds a few important corrections to the following packages:</p> + +<table border=0> +<tr><th>Package</th> <th>Reason</th></tr> +<correction avahi "Remove avahi-daemon-check-dns mechanism, which is no longer needed"> +<correction base-files "Update /etc/debian_version for the 10.9 point release"> +<correction cloud-init "Avoid logging generated passwords to world-readable log files [CVE-2021-3429]"> +<correction debian-archive-keyring "Add bullseye keys; retire jessie keys"> +<correction debian-installer "Use 4.19.0-16 Linux kernel ABI"> +<correction debian-installer-netboot-images "Rebuild against proposed-updates"> +<correction exim4 "Fix use of concurrent TLS connections under GnuTLS; fix TLS certificate verification with CNAMEs; README.Debian: document the limitation/extent of server certificate verification in the default configuration"> +<correction fetchmail "No longer report <q>System error during SSL_connect(): Success</q>; remove OpenSSL version check"> +<correction fwupd "Add SBAT support"> +<correction fwupd-amd64-signed "Add SBAT support"> +<correction fwupd-arm64-signed "Add SBAT support"> +<correction fwupd-armhf-signed "Add SBAT support"> +<correction fwupd-i386-signed "Add SBAT support"> +<correction fwupdate "Add SBAT support"> +<correction fwupdate-amd64-signed "Add SBAT support"> +<correction fwupdate-arm64-signed "Add SBAT support"> +<correction fwupdate-armhf-signed "Add SBAT support"> +<correction fwupdate-i386-signed "Add SBAT support"> +<correction gdnsd "Fix stack overflow with overly-large IPv6 addresses [CVE-2019-13952]"> +<correction groff "Rebuild against ghostscript 9.27"> +<correction hwloc-contrib "Enable support for the ppc64el architecture"> +<correction intel-microcode "Update various microcode"> +<correction iputils "Fix ping rounding errors; fix tracepath target corruption"> +<correction jquery "Fix untrusted code execution vulnerabilities [CVE-2020-11022 CVE-2020-11023]"> +<correction libbsd "Fix out-of-bounds read issue [CVE-2019-20367]"> +<correction libpano13 "Fix format string vulnerability"> +<correction libreoffice "Do not load encodings.py from current directoy"> +<correction linux "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72"> +<correction linux-latest "Update to -15 kernel ABI; update for -16 kernel ABI"> +<correction linux-signed-amd64 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72"> +<correction linux-signed-arm64 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72"> +<correction linux-signed-i386 "New upstream stable release; update ABI to -16; rotate secure boot signing keys; rt: update to 4.19.173-rt72"> +<correction lirc "Normalize embedded ${DEB_HOST_MULTIARCH} value in /etc/lirc/lirc_options.conf to find unmodified configuration files on all architectures; recommend gir1.2-vte-2.91 instead of non-existent gir1.2-vte"> +<correction m2crypto "Fix test failure with recent OpenSSL versions"> +<correction openafs "Fix outgoing connections after unix epoch time 0x60000000 (14 January 2021)"> +<correction portaudio19 "Handle EPIPE from alsa_snd_pcm_poll_descriptors, fixing crash"> +<correction postgresql-11 "New upstream stable release; fix information leakage in constraint-violation error messages [CVE-2021-3393]; fix CREATE INDEX CONCURRENTLY to wait for concurrent prepared transactions"> +<correction privoxy "Security issues [CVE-2020-35502 CVE-2021-20209 CVE-2021-20210 CVE-2021-20211 CVE-2021-20212 CVE-2021-20213 CVE-2021-20214 CVE-2021-20215 CVE-2021-20216 CVE-2021-20217 CVE-2021-20272 CVE-2021-20273 CVE-2021-20275 CVE-2021-20276]"> +<correction python3.7 "Fix CRLF injection in http.client [CVE-2020-26116]; fix buffer overflow in PyCArg_repr in _ctypes/callproc.c [CVE-2021-3177]"> +<correction redis "Fix a series of integer overflow issues on 32-bit systems [CVE-2021-21309]"> +<correction ruby-mechanize "Fix command injection issue [CVE-2021-21289]"> +<correction systemd "core: make sure to restore the control command id, too, fixing a segfault; seccomp: allow turning off of seccomp filtering via an environment variable"> +<correction uim "libuim-data: Perform symlink_to_dir conversion of /usr/share/doc/libuim-data in the resurrected package for clean upgrades from stretch"> +<correction xcftools "Fix integer overflow vulnerability [CVE-2019-5086 CVE-2019-5087]"> +<correction xterm "Correct upper-limit for selection buffer, accounting for combining characters [CVE-2021-27135]"> +</table> + + +<h2>Security Updates</h2> + + +<p>This revision adds the following security updates to the stable release. +The Security Team has already released an advisory for each of these +updates:</p> + +<table border=0> +<tr><th>Advisory ID</th> <th>Package</th></tr> +<dsa 2021 4826 nodejs> +<dsa 2021 4844 dnsmasq> +<dsa 2021 4845 openldap> +<dsa 2021 4846 chromium> +<dsa 2021 4847 connman> +<dsa 2021 4849 firejail> +<dsa 2021 4850 libzstd> +<dsa 2021 4851 subversion> +<dsa 2021 4853 spip> +<dsa 2021 4854 webkit2gtk> +<dsa 2021 4855 openssl> +<dsa 2021 4856 php7.3> +<dsa 2021 4857 bind9> +<dsa 2021 4858 chromium> +<dsa 2021 4859 libzstd> +<dsa 2021 4860 openldap> +<dsa 2021 4861 screen> +<dsa 2021 4862 firefox-esr> +<dsa 2021 4863 nodejs> +<dsa 2021 4864 python-aiohttp> +<dsa 2021 4865 docker.io> +<dsa 2021 4867 grub-efi-amd64-signed> +<dsa 2021 4867 grub-efi-arm64-signed> +<dsa 2021 4867 grub-efi-ia32-signed> +<dsa 2021 4867 grub2> +<dsa 2021 4868 flatpak> +<dsa 2021 4869 tiff> +<dsa 2021 4870 pygments> +<dsa 2021 4871 tor> +<dsa 2021 4872 shibboleth-sp> +</table> + + + +<h2>Debian Installer</h2> +<p>The installer has been updated to include the fixes incorporated +into stable by the point release.</p> + +<h2>URLs</h2> + +<p>The complete lists of packages that have changed with this revision:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>The current stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/stable/"> +</div> + +<p>Proposed updates to the stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/proposed-updates"> +</div> + +<p>stable distribution information (release notes, errata etc.):</p> + +<div class="center"> + <a + href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> +</div> + +<p>Security announcements and information:</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>About Debian</h2> + +<p>The Debian Project is an association of Free Software developers who +volunteer their time and effort in order to produce the completely +free operating system Debian.</p> + +<h2>Contact Information</h2> + +<p>For further information, please visit the Debian web pages at +<a href="$(HOME)/">https://www.debian.org/</a>, send mail to +<press@debian.org>, or contact the stable release team at +<debian-release@lists.debian.org>.</p> + + diff --git a/greek/News/2021/20210619.wml b/greek/News/2021/20210619.wml new file mode 100644 index 00000000000..28867daa99d --- /dev/null +++ b/greek/News/2021/20210619.wml @@ -0,0 +1,273 @@ +#use wml::debian::translation-check translation="e381a4552e96e017684cf783d08d728d9ad833af" maintainer="galaxico" +<define-tag pagetitle>Updated Debian 10: 10.10 released</define-tag> +<define-tag release_date>2021-06-19</define-tag> +#use wml::debian::news + +<define-tag release>10</define-tag> +<define-tag codename>buster</define-tag> +<define-tag revision>10.10</define-tag> + +<define-tag dsa> + <tr><td align="center"><a href="$(HOME)/security/%0/dsa-%1">DSA-%1</a></td> + <td align="center"><: + my @p = (); + for my $p (split (/,\s*/, "%2")) { + push (@p, sprintf ('<a href="https://packages.debian.org/src:%s">%s</a>', $p, $p)); + } + print join (", ", @p); +:></td></tr> +</define-tag> + +<define-tag correction> + <tr><td><a href="https://packages.debian.org/src:%0">%0</a></td> <td>%1</td></tr> +</define-tag> + +<define-tag srcpkg><a href="https://packages.debian.org/src:%0">%0</a></define-tag> + +<p>The Debian project is pleased to announce the tenth update of its +stable distribution Debian <release> (codename <q><codename></q>). +This point release mainly adds corrections for security issues, +along with a few adjustments for serious problems. Security advisories +have already been published separately and are referenced where available.</p> + +<p>Please note that the point release does not constitute a new version of Debian +<release> but only updates some of the packages included. There is +no need to throw away old <q><codename></q> media. After installation, +packages can be upgraded to the current versions using an up-to-date Debian +mirror.</p> + +<p>Those who frequently install updates from security.debian.org won't have +to update many packages, and most such updates are +included in the point release.</p> + +<p>New installation images will be available soon at the regular locations.</p> + +<p>Upgrading an existing installation to this revision can be achieved by +pointing the package management system at one of Debian's many HTTP mirrors. +A comprehensive list of mirrors is available at:</p> + +<div class="center"> + <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a> +</div> + + + + +<h2>Miscellaneous Bugfixes</h2> + +<p>This stable update adds a few important corrections to the following packages:</p> + +<table border=0> +<tr><th>Package</th> <th>Reason</th></tr> +<correction apt "Accept suite name changes for repositories by default (e.g. stable -> oldstable)"> +<correction awstats "Fix remote file access issues [CVE-2020-29600 CVE-2020-35176]"> +<correction base-files "Update /etc/debian_version for the 10.10 point release"> +<correction berusky2 "Fix segfault at startup"> +<correction clamav "New upstream stable release; fix denial of security issue [CVE-2021-1405]"> +<correction clevis "Fix support for TPMs that only support SHA256"> +<correction connman "dnsproxy: Check the length of buffers before memcpy [CVE-2021-33833]"> +<correction crmsh "Fix code execution issue [CVE-2020-35459]"> +<correction debian-installer "Use 4.19.0-17 Linux kernel ABI"> +<correction debian-installer-netboot-images "Rebuild against proposed-updates"> +<correction dnspython "XFR: do not attempt to compare to a non-existent <q>expiration</q> value"> +<correction dput-ng "Fix crash in the sftp uploader in case of EACCES from the server; update codenames; make <q>dcut dm</q> work for non-uploading DDs; fix a TypeError in http upload exception handling; don't try and construct uploader email from system hostname in .dak-commands files"> +<correction eterm "Fix code execution issue [CVE-2021-33477]"> +<correction exactimage "Fix build with C++11 and OpenEXR 2.5.x"> +<correction fig2dev "Fix buffer overflow [CVE-2021-3561]; several output fixes; rebuild testsuite during build and in autopkgtest"> +<correction fluidsynth "Fix use-after-free issue [CVE-2021-28421]"> +<correction freediameter "Fix denial of service issue [CVE-2020-6098]"> +<correction fwupd "Fix generation of the vendor SBAT string; stop using dpkg-dev in fwupd.preinst; new upstream stable version"> +<correction fwupd-amd64-signed "Sync with fwupd"> +<correction fwupd-arm64-signed "Sync with fwupd"> +<correction fwupd-armhf-signed "Sync with fwupd"> +<correction fwupd-i386-signed "Sync with fwupd"> +<correction fwupdate "Improve SBAT support"> +<correction fwupdate-amd64-signed "Sync with fwupdate"> +<correction fwupdate-arm64-signed "Sync with fwupdate"> +<correction fwupdate-armhf-signed "Sync with fwupdate"> +<correction fwupdate-i386-signed "Sync with fwupdate"> +<correction glib2.0 "Fix several integer overflow issues [CVE-2021-27218 CVE-2021-27219]; fix a symlink attack affecting file-roller [CVE-2021-28153]"> +<correction gnutls28 "Fix null-pointer dereference issue [CVE-2020-24659]; add several improvements to memory reallocation"> +<correction golang-github-docker-docker-credential-helpers "Fix double free issue [CVE-2019-1020014]"> +<correction htmldoc "Fix buffer overflow issues [CVE-2019-19630 CVE-2021-20308]"> +<correction ipmitool "Fix buffer overflow issues [CVE-2020-5208]"> +<correction ircii "Fix denial of service issue [CVE-2021-29376]"> +<correction isc-dhcp "Fix buffer overrun issue [CVE-2021-25217]"> +<correction isync "Reject <q>funny</q> mailbox names from IMAP LIST/LSUB [CVE-2021-20247]; fix handling of unexpected APPENDUID response code [CVE-2021-3578]"> +<correction jackson-databind "Fix external entity expansion issue [CVE-2020-25649] and several serialization-related issues [CVE-2020-24616 CVE-2020-24750 CVE-2020-35490 CVE-2020-35491 CVE-2020-35728 CVE-2020-36179 CVE-2020-36180 CVE-2020-36181 CVE-2020-36182 CVE-2020-36183 CVE-2020-36184 CVE-2020-36185 CVE-2020-36186 CVE-2020-36187 CVE-2020-36188 CVE-2020-36189 CVE-2021-20190]"> +<correction klibc "malloc: Set errno on failure; fix several overflow issues [CVE-2021-31873 CVE-2021-31870 CVE-2021-31872]; cpio: Fix possible crash on 64-bit systems [CVE-2021-31871]; {set,long}jmp [s390x]: save/restore the correct FPU registers"> +<correction libbusiness-us-usps-webtools-perl "Update to new US-USPS API"> +<correction libgcrypt20 "Fix weak ElGamal encryption with keys not generated by GnuPG/libgcrypt [CVE-2021-33560]"> +<correction libgetdata "Fix use after free issue [CVE-2021-20204]"> +<correction libmateweather "Adapt to renaming of America/Godthab to America/Nuuk in tzdata"> +<correction libxml2 "Fix out-of-bounds read in xmllint [CVE-2020-24977]; fix use-after-free issues in xmllint [CVE-2021-3516 CVE-2021-3518]; validate UTF8 in xmlEncodeEntities [CVE-2021-3517]; propagate error in xmlParseElementChildrenContentDeclPriv; fix exponential entity expansion attack [CVE-2021-3541]"> +<correction liferea "Fix compatibility with webkit2gtk >= 2.32"> +<correction linux "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81"> +<correction linux-latest "Update to 4.19.0-17 ABI"> +<correction linux-signed-amd64 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81"> +<correction linux-signed-arm64 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81"> +<correction linux-signed-i386 "New upstream stable release; increase ABI to 17; [rt] Update to 4.19.193-rt81"> +<correction mariadb-10.3 "New upstream release; security fixes [CVE-2021-2154 CVE-2021-2166 CVE-2021-27928]; fix Innotop support; ship caching_sha2_password.so"> +<correction mqtt-client "Fix denial of service issue [CVE-2019-0222]"> +<correction mumble "Fix remote code execution issue [CVE-2021-27229]"> +<correction mupdf "Fix use-after-free issue [CVE-2020-16600] and double free issue [CVE-2021-3407]"> +<correction nmap "Update included MAC prefix list"> +<correction node-glob-parent "Fix regular expression denial of service issue [CVE-2020-28469]"> +<correction node-handlebars "Fix code execution issues [CVE-2019-20920 CVE-2021-23369]"> +<correction node-hosted-git-info "Fix regular expression denial of service issue [CVE-2021-23362]"> +<correction node-redis "Fix regular expression denial of service issue [CVE-2021-29469]"> +<correction node-ws "Fix regular expression-related denial of service issue [CVE-2021-32640]"> +<correction nvidia-graphics-drivers "Fix improper access control vulnerability [CVE-2021-1076]"> +<correction nvidia-graphics-drivers-legacy-390xx "Fix improper access control vulnerability [CVE-2021-1076]; fix installation failure on Linux 5.11 release candidates"> +<correction opendmarc "Fix heap overflow issue [CVE-2020-12460]"> +<correction openvpn "Fix <q>illegal client float</q> issue [CVE-2020-11810]; ensure key state is authenticated before sending push reply [CVE-2020-15078]; increase listen() backlog queue to 32"> +<correction php-horde-text-filter "Fix cross-site scripting issue [CVE-2021-26929]"> +<correction plinth "Use session to verify first boot welcome step"> +<correction ruby-websocket-extensions "Fix denial of service issue [CVE-2020-7663]"> +<correction rust-rustyline "Fix build with newer rustc"> +<correction rxvt-unicode "Disable ESC G Q escape sequence [CVE-2021-33477]"> +<correction sabnzbdplus "Fix code execution vulnerability [CVE-2020-13124]"> +<correction scrollz "Fix denial of service issue [CVE-2021-29376]"> +<correction shim "New upstream release; add SBAT support; fix i386 binary relocations; don't call QueryVariableInfo() on EFI 1.10 machines (e.g. older Intel Macs); fix handling of ignore_db and user_insecure_mode; add maintainer scripts to the template packages to manage installing and removing fbXXX.efi and mmXXX.efi when we install/remove the shim-helpers-$arch-signed packages; exit cleanly if installed on a non-EFI system; don't fail if debconf calls return errors"> +<correction shim-helpers-amd64-signed "Sync with shim"> +<correction shim-helpers-arm64-signed "Sync with shim"> +<correction shim-helpers-i386-signed "Sync with shim"> +<correction shim-signed "Update for new shim; multiple bugfixes in postinst and postrm handling; provide unsigned binaries for arm64 (see NEWS.Debian); exit cleanly if installed on a non-EFI system; don't fail if debconf calls return errors; fix documentation links; build against shim-unsigned 15.4-5~deb10u1; add explicit dependency from shim-signed to shim-signed-common"> +<correction speedtest-cli "Handle case where <q>ignoreids</q> is empty or contains empty ids"> +<correction tnef "Fix buffer over-read issue [CVE-2019-18849]"> +<correction uim "libuim-data: Copy <q>Breaks</q> from uim-data, fixing some upgrade scenarios"> +<correction user-mode-linux "Rebuild against Linux kernel 4.19.194-1"> +<correction velocity "Fix potential arbitrary code execution issue [CVE-2020-13936]"> +<correction wml "Fix regression in Unicode handling"> +<correction xfce4-weather-plugin "Move to version 2.0 met.no API"> +</table> + + +<h2>Security Updates</h2> + + +<p>This revision adds the following security updates to the stable release. +The Security Team has already released an advisory for each of these +updates:</p> + +<table border=0> +<tr><th>Advisory ID</th> <th>Package</th></tr> +<dsa 2021 4848 golang-1.11> +<dsa 2021 4865 docker.io> +<dsa 2021 4873 squid> +<dsa 2021 4874 firefox-esr> +<dsa 2021 4875 openssl> +<dsa 2021 4877 webkit2gtk> +<dsa 2021 4878 pygments> +<dsa 2021 4879 spamassassin> +<dsa 2021 4880 lxml> +<dsa 2021 4881 curl> +<dsa 2021 4882 openjpeg2> +<dsa 2021 4883 underscore> +<dsa 2021 4884 ldb> +<dsa 2021 4885 netty> +<dsa 2021 4886 chromium> +<dsa 2021 4887 lib3mf> +<dsa 2021 4888 xen> +<dsa 2021 4889 mediawiki> +<dsa 2021 4890 ruby-kramdown> +<dsa 2021 4891 tomcat9> +<dsa 2021 4892 python-bleach> +<dsa 2021 4893 xorg-server> +<dsa 2021 4894 php-pear> +<dsa 2021 4895 firefox-esr> +<dsa 2021 4896 wordpress> +<dsa 2021 4898 wpa> +<dsa 2021 4899 openjdk-11-jre-dcevm> +<dsa 2021 4899 openjdk-11> +<dsa 2021 4900 gst-plugins-good1.0> +<dsa 2021 4901 gst-libav1.0> +<dsa 2021 4902 gst-plugins-bad1.0> +<dsa 2021 4903 gst-plugins-base1.0> +<dsa 2021 4904 gst-plugins-ugly1.0> +<dsa 2021 4905 shibboleth-sp> +<dsa 2021 4907 composer> +<dsa 2021 4908 libhibernate3-java> +<dsa 2021 4909 bind9> +<dsa 2021 4910 libimage-exiftool-perl> +<dsa 2021 4912 exim4> +<dsa 2021 4913 hivex> +<dsa 2021 4914 graphviz> +<dsa 2021 4915 postgresql-11> +<dsa 2021 4916 prosody> +<dsa 2021 4918 ruby-rack-cors> +<dsa 2021 4919 lz4> +<dsa 2021 4920 libx11> +<dsa 2021 4921 nginx> +<dsa 2021 4922 hyperkitty> +<dsa 2021 4923 webkit2gtk> +<dsa 2021 4924 squid> +<dsa 2021 4925 firefox-esr> +<dsa 2021 4926 lasso> +<dsa 2021 4928 htmldoc> +<dsa 2021 4929 rails> +<dsa 2021 4930 libwebp> +</table> + + +<h2>Removed packages</h2> + +<p>The following packages were removed due to circumstances beyond our control:</p> + +<table border=0> +<tr><th>Package</th> <th>Reason</th></tr> +<correction sogo-connector "Incompatible with current Thunderbird versions"> + +</table> + +<h2>Debian Installer</h2> +<p>The installer has been updated to include the fixes incorporated +into stable by the point release.</p> + +<h2>URLs</h2> + +<p>The complete lists of packages that have changed with this revision:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog"> +</div> + +<p>The current stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/stable/"> +</div> + +<p>Proposed updates to the stable distribution:</p> + +<div class="center"> + <url "http://ftp.debian.org/debian/dists/proposed-updates"> +</div> + +<p>stable distribution information (release notes, errata etc.):</p> + +<div class="center"> + <a + href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a> +</div> + +<p>Security announcements and information:</p> + +<div class="center"> + <a href="$(HOME)/security/">https://www.debian.org/security/</a> +</div> + +<h2>About Debian</h2> + +<p>The Debian Project is an association of Free Software developers who +volunteer their time and effort in order to produce the completely +free operating system Debian.</p> + +<h2>Contact Information</h2> + +<p>For further information, please visit the Debian web pages at +<a href="$(HOME)/">https://www.debian.org/</a>, send mail to +<press@debian.org>, or contact the stable release team at +<debian-release@lists.debian.org>.</p> + + diff --git a/greek/News/2021/20210812.wml b/greek/News/2021/20210812.wml new file mode 100644 index 00000000000..9168c2fb505 --- /dev/null +++ b/greek/News/2021/20210812.wml @@ -0,0 +1,47 @@ +#use wml::debian::translation-check translation="a48c50faef33185d0ae2746854bc99435817bad1" maintainer="galaxico" +<define-tag pagetitle>The Debian Project mourns the loss of Robert Lemmen, Karl Ramm and Rogério Theodoro de Brito</define-tag> +<define-tag release_date>2021-08-12</define-tag> +#use wml::debian::news + +<p>The Debian Project has lost several members of its +community in the last year.</p> + +<p> +In June 2020, Robert Lemmen passed away after a serious illness. +Robert had been regularly attending the Debian Munich meetups since the +early 00s and helped with local booths. +He had been a Debian Developer since 2007. Among other contributions, +he packaged modules for Raku (Perl6 at that time) and helped other +contributors to get involved in the Raku Team. +He also put effort into tracking down circular dependencies in Debian. +</p> + +<p> +Karl Ramm passed away in June 2020, after complications due to metastatic colon cancer. +He had been a Debian Developer since 2001 and packaged several components of MIT's +<a href="https://en.wikipedia.org/wiki/Project_Athena">Project Athena</a>. +He was passionate about technology and Debian, +and always interested in helping others to find and promote their passions. +</p> + +<p> +In April 2021, we lost Rogério Theodoro de Brito due to the COVID-19 pandemic. +Rogério enjoyed coding small tools and had been a Debian contributor for more than 15 years. +Among other projects, he contributed toward the use of Kurobox/Linkstation devices in Debian +and maintained the youtube-dl tool. He also participated and was <q>Debian contact</q> in several upstream projects. +</p> + +<p>The Debian Project honors Robert, Karl and Rogerio's good work and strong dedication to Debian +and Free Software. Their contributions will not be forgotten, and the +high standards of their work will continue to serve as an inspiration to +others.</p> + +<h2>About Debian</h2> +<p>The Debian Project is an association of Free Software developers who +volunteer their time and effort in order to produce the completely free +operating system Debian.</p> + +<h2>Contact Information</h2> +<p>For further information, please visit the Debian web pages at +<a href="$(HOME)/">http://www.debian.org/</a> or send mail to +<<a href="mailto:press@debian.org">press@debian.org</a>>.</p> diff --git a/greek/News/2021/20210814.wml b/greek/News/2021/20210814.wml new file mode 100644 index 00000000000..3bcd4a4dc02 --- /dev/null +++ b/greek/News/2021/20210814.wml @@ -0,0 +1,273 @@ +#use wml::debian::translation-check translation="7ce619292bb7825470d6cb611887d68f405623ff" maintainer="galaxico" +<define-tag pagetitle>Το Debian 11 <q>bullseye</q> κυκλοφόρησε!</define-tag> +<define-tag release_date>2021-08-14</define-tag> +#use wml::debian::news + + +<p>Μετά από 2 χρόνια, 1 μήνα και 9 ημέρες ανάπτυξης, το Σχέδιο Debian +παρουσιάζει με περηφάνεια την καινούρια του σταθερή έκδοση 11 (με το κωδικό όνομα <q>bullseye</q>), +η οποία θα υποστηρίζεται για τα επόμενα 5 χρόνια χάρις στην συνδυαστική δουλειά της +<a href="https://security-team.debian.org/">ομάδας ασφαλείας του Debian</a> +και της ομάδας <a href="https://wiki.debian.org/LTS">Μακρόχρονης Υποστήριξης του Debian (Long Term Support)</a>. +</p> + +<p> +Το Debian 11 <q>bullseye</q> κυκλοφορεί με αρκετές εφαρμογές και περιβάλλοντα επιφάνειας γραφείου. Μεταξύ άλλων περιλαμβάνει +τώρα τα περιβάλλοντα επιφάνειας γραφείου: +</p> +<ul> +<li>Gnome 3.38,</li> +<li>KDE Plasma 5.20,</li> +<li>LXDE 11,</li> +<li>LXQt 0.16,</li> +<li>MATE 1.24,</li> +<li>Xfce 4.16.</li> +</ul> + + +<p>Αυτή η κυκλοφορία περιέχει περισσότερα από 11.294 καινούρια πακέτα για έναν συνολικό αριθμό 59.551 +πακέτων, μαζί με μια σημαντική μείωση περισσότερων από 9.519 πακέτων που ήταν χαρακτηρισμένα ως +<q>παρωχημένα</q> και αφαιρέθηκαν. 42.821 πακέτα επικαιροποιήθηκαν και 5.434 πακέτα παρέμειναν +χωρίς αλλαγές. +</p> + +<p> +Η έκδοση <q>bullseye</q> είναι η πρώτη έκδοση που παρέχει έναν πυρήνα του Linux με υποστήριξη για το +σύστημα αρχείων exFAT και το χρησιμοποιεί εξ ορισμού για την προσάρτηση συστημάτων αρχείων exFAT. +Συνεπώς δεν απαιτείται πλέον να χρησιμοποιείτε την υλοποίηση filesystem-in-userspace που +παρέχεται μέσω του πακέτου exfat-fuse package. Εργαλεία για τη δημιουργία και τον έλεγχο ενός +συστήματος αρχείων exFAT παρέχονται με το πακέτο exfatprogs. +</p> + + +<p> +Οι περισσότεροι σύγχρονοι εκτυπωτές μπορούν να εκτυπώνουν χωρίς την χρήση οδηγών (drivers) και να σαρώνουν χωρίς την +ανάγκη για οδηγούς (συχνά μη ελεύθερους) των συγκεκριμένων κατασκευαστών. + +Η έκδοση <q>bullseye</q> φέρνει ένα καινούριο πακέτο, το ipp-usb, που χρησιμοποιεί το ανεξάρτητο από τον +κατασκευαστή πρωτόκολλο IPP-over-USB το οποίο υποστηρίζεται από πολλούς σύγχρονους εκτυπωτές. Αυτό +επιτρέπει σε μια συσκευή USB να χρησιμοποιείται ως μια δικτυακή συσκευή. Το επίσημο χωρίς οδηγό SANE backend +προσφέρεται από το πρόγραμμα sane-escl στο πακέτο libsane1, που χρησιμοποιεί το πρωτόκολλο eSCL. +</p> + +<p> +Το systemd στην έκδοση <q>bullseye</q> ενεργοποιεί εξ ορισμού την persistent λειτουργικότητα του ημερολογίου (journal) με +υπόρρητη fallback επιλογή το volatile storage. Αυτό επιτρέπει στους χρήστες που δεν βασίζονται σε +ειδικά γνωρίσματα να απεγκαθιστούν παραδοσιακούς δαίμονες καταγραφής (logging) και να αλλάξουν +στην χρήση μόνο του ημερολογίου (journal) του systemd. +</p> + +<p> +Η ομάδα του Debian Med έχει πάρει μέρος στον αγώνα ενάντια στην COVID-19 +δημιουργώντας πακέτα λογισμικού για την έρευνα του ιού στο επίπεδο της ακολουθίας (DNA) +και στην μάχη εναντίον της πανδημίας με εργαλεία που χρησιμοποιούνται στην επιδημιολογία· αυτό +το έργο θα συνεχιστεί με εστίαση σε εργαλεία μηχανικής μάθησης και στα δυο πεδία. Η δουλειά της +ομάδας με την ομάδα Διασφάλισης Ποιότητας (Quality Assurance) και Συνεχούς ολοκλήρωσης (Continuous integration) +είναι κρίσιμης σημασίας για την παραγωγή συνεπώς αναπαραγώμενων αποτελεσμάτων που απαιτούνται στις επιστήμες. + +Το Μείγμα Debian Med έχει ένα φάσμα εφαρμογών στις οποίες η απόδοση είναι κρίσιμης σημασίας και οι οποίες +τώρα επωφελούνται από το SIMD Everywhere. Για να εγκαταστήσετε πακέτα που συντηρούνται από την ομάδα Debian Med, +εγκαταστήστε τα μεταπακέτα με το πρόθεμα med-*, τα οποία βρίσκονται στην έκδοση 3.6.x. +</p> + +<p> +Τα Κινεζικά, Ιαπωνικά, Κορεάτικα και πολλές άλλες γλώσσες έχουν τώρα μια νέα Fcitx 5 μέθοδο εισαγωγής,η +οποία είναι διάδοχος της δημοφιλούς μεθόδου Fcitx4 στην έκδοση <q>buster</q>· αυτή η νέα έκδοση έχει +πολύ καλλίτερη υποστήριξη για πρόσθετων για το Wayland (ο προεπιλεγμένος διαχειριστής οθόνης). +</p> + +<p> +Το Debian 11 <q>bullseye</q> περιλαμβάνει ένα πλήθος επικαιροποιημένων πακέτων λογισμικού (πάνω από το +72% όλων των πακέτων της προηγούμενης έκδοσης), τέτοια όπως: +</p> +<ul> +<li>Apache 2.4.48</li> +<li>BIND DNS Server 9.16</li> +<li>Calligra 3.2</li> +<li>Cryptsetup 2.3</li> +<li>Emacs 27.1</li> +<li>GIMP 2.10.22</li> +<li>GNU Compiler Collection 10.2</li> +<li>GnuPG 2.2.20</li> +<li>Inkscape 1.0.2</li> +<li>LibreOffice 7.0</li> +<li>Linux kernel 5.10 series</li> +<li>MariaDB 10.5</li> +<li>OpenSSH 8.4p1</li> +<li>Perl 5.32</li> +<li>PHP 7.4</li> +<li>PostgreSQL 13</li> +<li>Python 3, 3.9.1</li> +<li>Rustc 1.48</li> +<li>Samba 4.13</li> +<li>Vim 8.2</li> +<li>περισσότερα από 59.000 άλλα έτοιμα για χρήση πακέτα, μεταγλωττισμένα από περισσότερα από +30.000 πακέτα πηγαίου κώδικα.</li> +</ul> + +<p> +Με αυτή τη μεγάλη επιλογή πακέτων και την παραδοσιακά ευρεία υποστήριξη +αρχιτεκτονικών, το Debian για μια ακόμα φορά παραμένει πιστό στον στόχο του +να είναι <q>Το Οικουμενικό Λειτουργικό Σύστημα</q>. Είναι κατάλληλο για πολλές +διαφορετικές περιπτώσεις χρήσης: από επιτραπέζια συστήματα μέχρι φορητούς υπολογιστές· +από εξυπηρετητές ανάπτυξης μέχρι συστήματα Νέφους· όπως και για εξυπηρετητές βάσεων +δεδομένων, web και αποθήκευσης. Την ίδια στιγμή, οι προσπάθειες διασφάλισης ποιότητας όπως +οι αυτοματοποιημένες δοκιμές εγκατάστασης και αναβάθμισης για όλα τα πακέτα στην αρχειοθήκη +του Debian εξασφαλίζουν ότι η έκδοση <q>bullseye</q> εκπληρώνει τις υψηλές προσδοκίες +που έχουν οι χρήστες από μια σταθερή έκδοση του Debian. +</p> + +<p> +Συνολικά εννιά αρχιτεκτονικές υποστηρίζονται: +64-bit PC / Intel EM64T / x86-64 (<code>amd64</code>), +32-bit PC / Intel IA-32 (<code>i386</code>), +64-bit little-endian Motorola/IBM PowerPC (<code>ppc64el</code>), +64-bit IBM S/390 (<code>s390x</code>), +για την ARM, <code>armel</code> +και <code>armhf</code> για παλιότερα και πιο πρόσφατα 32-μπιτα συστήματα, +και επιπλέον η <code>arm64</code> για την 64-μπιτη <q>AArch64</q> αρχιτεκτονική, +και για την MIPS, η <code>mipsel</code> (little-endian) αρχιτεκτονική για 32-μπιτα συστήματα +και η <code>mips64el</code> αρχιτεκτονική για 64-μπιτα little-endian συστήματα. +</p> + +<h3>Θέλετε να τη δοκιμάσετε;</h3> +<p> +Αν απλά θέλετε να δοκιμάσετε την έκδοση Debian 11 <q>bullseye</q> χωρίς να την εγκαταστήσετε, +μπορείτε να χρησιμοποιήσετε μια από τις διαθέσιμες <a href="$(HOME)/CD/live/">live εικόνες</a> +που φορτώνουν και τρέχουν το πλήρες λειτουργικό σύστημα σε μια κατάσταση read-only +στην μνήμη του υπολογιστή. +</p> + +<p> +Αυτές οι live εικόνες προσφέρονται για τις αρχιτεκτονικές <code>amd64</code> και +<code>i386</code> και είναι διαθέσιμες σε διαμορφώσεις DVD, κλειδιών USB και netboot. +Ο χρήστης μπορεί να διαλέξει για να δοκιμάσει ανάμεσα σε δαφορετικά περιβάλλοντα +επιφάνειας εργασίας: GNOME, KDE Plasma, LXDE, LXQt, MATE, και Xfce. +Το Debian Live <q>bullseye</q> έχει μια συνηθισμένη live εικόνα, οπότε είναι επίσης +εφικτό να δοκιμάσετε ένα βασικό σύστημα Debian χωρίς κάποιες από τις γραφικές διεπαφές χρήστη. +</p> + +<p> +Αν απολαύσατε το λειτουργικό σύστημα έχετε την επιλογή να το εγκαταστήσετε +από την live εικόνα στον σκληρό δίσκο του υπολογιστή σας. Η live εικόνα περιλαμβάνει +τον ανεξάρτητο εγκαταστάτη Calamares καθώς και τον συνηθισμένο εγκαταστάτη του Debian. +Περισσότερες πληροφορίες είναι διαθέσιμες στις ενότητες +<a href="$(HOME)/releases/bullseye/releasenotes">Σημειώσεις της Έκδοσης</a> και +<a href="$(HOME)/CD/live/">live εικόνες εγκατάστασης</a> του ιστότοπου του Debian. +</p> + +<p> +Για να εγκαταστήσετε το Debian 11 <q>bullseye</q> απευθείας στον σκληρό δίσκο του +συστήματός σας μπορείτε να επιλέξετε από μια ποικιλία μέσως εγκατάστασης +όπως δίσκους Blu-ray, DVD, CD, κλειδιά USB ή μέσω μιας δικτυακής σύνδεσης. +Μέσω αυτών των εικόνων μπορούν να εγκατασταθούν αρκετά περιβάλλοντα επιφάνειας εργασίας — Cinnamon, GNOME, KDE Plasma Desktop and +Applications, LXDE, LXQt, MATE και Xfce —. +Επιπλέον, διατίθενται CD <q>πολλαπλών αρχιτεκτονικών</q> οι οποίες υποστηρίζουν +την εγκατάσταση από μια επιλογή αρχιτεκτονικών από έναν μοναδικό δίσκο. Ή μπορείτε πάντα +να δημιουργήσετε ένα εκκινήσιμο μέσο εγκατάστασης σε USB +(δείτε τον <a href="$(HOME)/releases/bullseye/installmanual">Οδηγό Εγκατάστασης</a> +για περισσότερες λεπτομέρειες). +</p> + +# Translators: some text taken from /devel/debian-installer/News/2021/20210802 + +<p> +Έχει γίνει σημαντική ανάπτυξη του Εγκαταστάτη του Debian που έχει +σαν αποτέλεσμα βελτιωμένη υποστήριξη υλικού καθώς και άλλα νέα γνωρίσματα. +</p> +<p> +Σε μερικές περιπτώσεις, μια επιτυχημένη εγκατάσταση μπορεί να εξακολουθεί +να έχει προβλήματα με την οθόνη κατά την επανεκκίνηση στο μόλις εγκαταστημένο σύστημα· +για αυτές τις περιπτώσεις υπάρχουν +<a href="https://www.debian.org/releases/bullseye/amd64/ch06s04#completing-installed-system">μερικές εναλλακτικές</a> +που μπορούν να βοηθήσουν παρ' όλα αυτά στην είσοδο στο σύστημα. +Υπάρχει επίσης μια +<a href="https://www.debian.org/releases/bullseye/amd64/ch06s04#completing-installed-system">isenkram-based διαδικασία</a> +που επιτρέπει στους χρήστες να ανιχνεύουν και να διορθώνουν υλισμικό που απουσιάζει από το σύστημά τους, +με έναν αυτοματοποιημένο τρόπο. Φυσικά, κάποιος θα πρέπει να ζυγίσει τα υπέρ και τα κατά +της χρήσης αυτού του εργαλείου μιας και είναι πολύ πιθανό ότι θα χρειαστεί την εγκατάσταση +μη-ελεύθετων πακέτων.</p> + +<p> + Πέρα από αυτό, οι + <a href="https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/">non-free εικόνες του εγκαταστάτη + που περιλαμβάνουν πακέτα υλισμικού (firmware)</a> έχουν βελτιωθεί ώστε να μπορούν να προλαμβάνουν + τις ανάγκες σε υλισμικό για το εγκαταστημένο σύστημα (πχ. υλισμικό για κάρτες γραφικών AMD και Nvidia ή + νεώτερες γενιές υλικού για ήχο της Intel). +</p> + +<p> +Για χρήστες του Νέφους, το Debian προσφέρει άμεση υποστήριξη για πολλές από +τις πιο γνωστές πλατφόρμες. Επίσημες εικόνες Debian επιλέγονται εύκολα +μέσα από την κάθε "αγορά" εικόνων για Νέφος. Το Debian κυκλοφορεί επίσης <a +href="https://cloud.debian.org/images/openstack/current/">προδημιουργημένες +OpenStack εικόνες</a> για τις αρχιτεκτονικές <code>amd64</code> και <code>arm64</code>, +έτοιμες για μεταφόρτωση και χρήση σε τοπικές διαμορφώσεις Νέφους. +</p> + +<p> +Το Debian μπορεί τώρα να εγκατασταθεί σε 76 γλώσσες, με τις περισσότερες +διαθέσιμες τόσο σε βασισμένες σε κείμενο όσο και γραφικές διεπαφές χρήστη. +</p> + +<p> +Οι εικόνες εγκατάστασης μπορούν να μεταφορτωθούν αμέσως τώρα μέσω +<a href="$(HOME)/CD/torrent-cd/">bittorrent</a> (η συνιστώμενη μέθοδος), +<a href="$(HOME)/CD/jigdo-cd/#which">jigdo</a>, ή +<a href="$(HOME)/CD/http-ftp/">HTTP</a>· δείτε τον σύνδεσμο +<a href="$(HOME)/CD/">Debian on CDs</a> για περαιτέρω πληροφορίες. Η έκδοση <q>bullseye</q> +θα είναι σύντομα διαθέσιμη επίσης σε φυσικούς δίσκους DVD, CD-ROM και Blu-ray από πολυάριθμους +<a href="$(HOME)/CD/vendors">κατασκευαστές</a>. +</p> + + +<h3>Αναβαθμίζοντας το Debian</h3> +<p> +Αναβαθμίσεις στην έκδοση Debian 11 από την προηγούμενη έκδοση Debian 10 +(με το κωδικό όνομα <q>buster</q>) τις χειρίζεται, για τις περισσότερες διαμορφώσεις, + αυτόματα το εργαλείο διαχείρισης πακέτων APT. +</p> + +<p> +Για την έκδοση bullseye, η σουίτα ασφαλείας ονομάζεται τώρα bullseye-security +και οι χρήστες θα πρέπει να προσαρμόσουν τα αρχεία των APT source-list αντίστοιχα όταν +πραγματοποιούν μια αναβάθμιση. Αν οι ρυθμίσεις του APT περιλαμβάνουν επίσης "pinning" ή την επιλογή <code>APT::Default-Release</code>, +είναι πιθανόν να χρειάζονται επίσης προσαρμογές. Δείτε την ενότητα +<a href="https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information#security-archive">Changed security archive layout</a> +των Σημειώσεων της Έκδοσης για περισσότερες λεπτομέρειες. +</p> + +<p> +Αν κάνετα την αναβάθμιση από απόσταση, λάβετε υπόψιν την ενότητα +<a href="$(HOME)/releases/bullseye/amd64/release-notes/ch-information#ssh-not-available">No new SSH connections possible during upgrade</a>. +</p> + +<p> +Όπως πάντα, τα συστήματα Debian μπορού να αναβαθμιστούν χωρίς κόπο, επί τόπου, +χωρίς αναγκαστικό χρόνο διακοπής της λειτουργίας, αλλά συνιστάται έντονα να +διαβάσετε τις <a href="$(HOME)/releases/bullseye/releasenotes">Σημειώσεις της Έκδοσης</a> +καθώς και τον <a href="$(HOME)/releases/bullseye/installmanual">Οδηγό Εγκατάστασης</a> +για πιθανά ζητήματα καθώς και για λεπτομερείς οδηγίες για την εγκατάσταση και την αναβάθμιση. +Οι Σημειώσεις της Έκδοσης θα βελτιωθούν ακόμα περισσότερο και θα +μεταφραστούν σε επιπλέον γλώσσες στις εβδομάδες μετά την κυκλοφορία της έκδοσης. +</p> + + +<h2>Σχετικά με το Debian</h2> + +<p> +Το Debian είναι ένα ελεύθερο λειτουργικό σύστημα που αναπτύσσεται από χιλιάδες +εθελοντές από ολόκληρο τον κόσμο που συνεργάζονται μέσω του Διαδικτύου. Τα κομβικά δυνατά σημεία του +Debian είναι η βάση των εθελοντών του, η αφοσίωσή του στο Κοινωνικό του Συμβόλαιο και το Ελεύθερο Λογισμικό +και η δέσμευσή του για την προσφορά του καλλίτερου δυνατού λειτουργικού συστήματος. Αυτή +η καινούρια κυκλοφορία είναι άλλο ένα σημαντικό βήμα προς αυτή την κατεύθυνση. +</p> + + +<h2>Πληροφορίες Επικοινωνίας</h2> + +<p> +Για περισσότετες πληροφορίες, παρακαλούμε επισκεφθείτε τις ιστοσελίδες του Debian στον ιστότοπο +<a href="$(HOME)/">https://www.debian.org</a> ή στείλτε ένα ηλεκτρονικό μήνυμα στη διεύθυνση +<press@debian.org>. +</p> diff --git a/greek/News/2021/20210815.wml b/greek/News/2021/20210815.wml new file mode 100644 index 00000000000..1a8a59ee0a9 --- /dev/null +++ b/greek/News/2021/20210815.wml @@ -0,0 +1,195 @@ +#use wml::debian::translation-check translation="e7ce9859ec2794a8c0d0978182d2d513ed96cfa0" maintainer="galaxico" +<define-tag pagetitle>Debian Edu / Skolelinux Bullseye — a complete Linux solution for your school</define-tag> +<define-tag release_date>2021-08-15</define-tag> +#use wml::debian::news + +<p> +Are you the administrator for a computer lab or an entire school network? +Would you like to install servers, workstations, and laptops to +work together? +Do you want the stability of Debian with network services already +preconfigured? +Do you wish to have a web-based tool to manage systems and several +hundred or even more user accounts? +Have you asked yourself if and how older computers could be used? +</p> + +<p> +Then Debian Edu is for you. The teachers themselves or their technical support +can roll out a complete multi-user multi-machine study environment within +a few days. Debian Edu comes with hundreds of applications pre-installed, +and you can always add more packages from Debian. +</p> + +<p> +The Debian Edu developer team is happy to announce Debian Edu 11 +<q>Bullseye</q>, the Debian Edu / Skolelinux release based +on the Debian 11 <q>Bullseye</q> release. +Please consider testing it and reporting back (<debian-edu@lists.debian.org>) +to help us to improve it further. +</p> + +<h2>About Debian Edu and Skolelinux</h2> + +<p> +<a href="https://blends.debian.org/edu"> Debian Edu, also known as +Skolelinux</a>, is a Linux distribution based on Debian providing an +out-of-the box environment of a completely configured school network. +Immediately after installation, a school server running all services +needed for a school network is set up just waiting for users and +machines to be added via GOsa², a comfortable web interface. +A netbooting environment is prepared, so after initial +installation of the main server from CD / DVD / BD or USB stick all other +machines can be installed via the network. +Older computers (even up to ten or so years old) can be used as LTSP +thin clients or diskless workstations, booting from the network without +any installation and configuration at all. +The Debian Edu school server provides an LDAP database and Kerberos +authentication service, centralized home directories, a DHCP server, a web +proxy and many other services. The desktop environment contains more than 70 +educational software packages and more are available from the Debian archive. +Schools can choose between the desktop environments Xfce, GNOME, LXDE, +MATE, KDE Plasma, Cinnamon and LXQt. +</p> + +<h2>New features for Debian Edu 11 <q>Bullseye</q></h2> + +<p>These are some items from the release notes for Debian Edu 11 <q>Bullseye</q>, +based on the Debian 11 <q>Bullseye</q> release. +The full list including more detailed information is part of the related +<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Features#New_features_in_Debian_Edu_Bullseye">Debian Edu manual chapter</a>. +</p> + +<ul> +<li> +New <a href="https://ltsp.org">LTSP</a> to support diskless workstations. Thin +clients are still supported, now using <a href="https://wiki.x2go.org">X2Go</a> +technology. +</li> +<li> +Booting over the network is provided using iPXE instead of PXELINUX to be +compliant with LTSP. +</li> +<li> +The Debian Installer's graphical mode is used for iPXE installations. +</li> +<li> +Samba is now configured as <q>standalone server</q> with support for SMB2/SMB3. +</li> +<li> +DuckDuckGo is used as default search provider for both Firefox ESR and Chromium. +</li> +<li> +New tool added to set up freeRADIUS with support for both EAP-TTLS/PAP and +PEAP-MSCHAPV2 methods. +</li> +<li> +Improved tool available to configure a new system with <q>Minimal</q> profile as +dedicated gateway. +</li> +</ul> + +<h2>Download options, installation steps and manual</h2> + +<p> +Official Debian Network-Installer CD images for both 64-bit and 32-bit PCs +are available. The 32-bit image will only be needed in rare cases (for +PCs older than around 15 years). The images can be downloaded at the following +locations: +</p> +<ul> +<li> +<url http://get.debian.org/cdimage/release/current/amd64/iso-cd/> +</li> +<li> +<url http://get.debian.org/cdimage/release/current/i386/iso-cd/> +</li> +</ul> + +<p> +Alternatively official Debian BD images (more than 5 GB in size) are also +available. It is possible to set up a whole Debian Edu network without an +Internet connection (including all desktop environments and localization for all +languages supported by Debian). +These images can be downloaded at the following locations: +</p> + +<ul> +<li> +<url http://get.debian.org/cdimage/release/current/amd64/iso-bd/> +</li> +<li> +<url http://get.debian.org/cdimage/release/current/i386/iso-bd/> +</li> +</ul> + +<p> +The images can be verified using the signed checksums provided in the download +directory. +<br /> +Once you've downloaded an image, you can check that +<ul> +<li> +its checksum matches that expected from the checksum file; and that +</li> +<li> +the checksum file has not been tampered with. +</li> +</ul> +For more information about how to do these steps, read the +<a href="https://www.debian.org/CD/verify">verification guide</a>. +</p> + +<p> +Debian Edu 11 <q>Bullseye</q> is entirely based on Debian 11 <q>Bullseye</q>; +so the sources for all packages are available from the Debian archive. +</p> + +<p> +Please note the +<a href="https://wiki.debian.org/DebianEdu/Status/Bullseye">Debian Edu Bullseye status page</a>. +for always up-to-date information about Debian Edu 11 <q>Bullseye</q> including +instructions how to use <code>rsync</code> for downloading the ISO images. +</p> + +<p> +When upgrading from Debian Edu 10 <q>Buster</q> please read the related +<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Upgrades">Debian Edu manual chapter</a>. +</p> + +<p> +For installation notes please read the related +<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/Installation#Installing_Debian_Edu">Debian Edu manual chapter</a>. +</p> + +<p> +After installation you need to take these +<a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/GettingStarted">first steps</a>. +</p> + +<p> +Please see the <a href="https://wiki.debian.org/DebianEdu/Documentation/Bullseye/">Debian Edu wiki pages</a> +for the latest English version of the Debian Edu <q>Bullseye</q> manual. +The manual has been fully translated to German, French, Italian, Danish, Dutch, +Norwegian Bokmål, Japanese, Simplified Chinese and Portuguese (Portugal). +Partly translated versions exist for Spanish, Romanian and Polish. +An overview of <a href="https://jenkins.debian.net/userContent/debian-edu-doc/"> +the latest published versions of the manual</a> is available. +</p> + +<p> +More information about Debian 11 <q>Bullseye</q> itself is provided in the +release notes and the installation manual; see <a href="$(HOME)/">https://www.debian.org/</a>. +</p> + +<h2>About Debian</h2> + +<p>The Debian Project is an association of Free Software developers who +volunteer their time and effort in order to produce the completely free +operating system Debian.</p> + +<h2>Contact Information</h2> + +<p>For further information, please visit the Debian web pages at +<a href="$(HOME)/">https://www.debian.org/</a> or send mail to +<press@debian.org>.</p> diff --git a/greek/News/2021/Makefile b/greek/News/2021/Makefile new file mode 100644 index 00000000000..c26323c0c92 --- /dev/null +++ b/greek/News/2021/Makefile @@ -0,0 +1 @@ +include $(subst webwml/greek,webwml/english,$(CURDIR))/Makefile diff --git a/greek/News/2021/index.wml b/greek/News/2021/index.wml new file mode 100644 index 00000000000..9cf02db20c0 --- /dev/null +++ b/greek/News/2021/index.wml @@ -0,0 +1,14 @@ +#use wml::debian::template title="Νέα του 2021" +#use wml::debian::recent_list +#use wml::debian::translation-check translation="2af6d80fe3502b92c36bbba14300afc5912e6e6c" maintainer="galaxico" + +<p><:= get_recent_list ('.', '0', '$(ENGLISHDIR)/News/2021', '', +'\d+\w*') :></p> + +<p>Σημείωση: μπορείτε να έχετε τα πιο πρόσφατα νέα του Debian +εγγραφόμενοι/ες ή περιηγούμενοι/ες την αρχειοθήκη των λιστών αλληλογραφίας +<a +href="https://lists.debian.org/debian-announce/debian-announce-2021/">\ +<strong>debian-announce</strong></a> και +<a href="https://lists.debian.org/debian-news/">\ +<strong>debian-news</strong></a></p> |